summaryrefslogtreecommitdiff
path: root/doc/po/pl.po
diff options
context:
space:
mode:
Diffstat (limited to 'doc/po/pl.po')
-rw-r--r--doc/po/pl.po8
1 files changed, 4 insertions, 4 deletions
diff --git a/doc/po/pl.po b/doc/po/pl.po
index 8361a2dbf..ff41c0259 100644
--- a/doc/po/pl.po
+++ b/doc/po/pl.po
@@ -728,7 +728,7 @@ msgid ""
"packages currently installed on the system from the sources configured via "
"&sources-list;. New packages will be installed if required to satisfy "
"dependencies, but existing packages will never be removed. If an upgrade for "
-"a package requires the remove of an installed package the upgrade for this "
+"a package requires the removal of an installed package the upgrade for this "
"package isn't performed."
msgstr ""
@@ -4984,7 +4984,7 @@ msgstr ""
msgid ""
"The <literal>Ignore-Files-Silently</literal> list can be used to specify "
"which files APT should silently ignore while parsing the files in the "
-"fragment directories. Per default a file which end with <literal>.disabled</"
+"fragment directories. Per default a file which ends with <literal>.disabled</"
"literal>, <literal>~</literal>, <literal>.bak</literal> or <literal>.dpkg-[a-"
"z]+</literal> is silently ignored. As seen in the last default value these "
"patterns can use regular expression syntax."
@@ -7495,7 +7495,7 @@ msgid ""
"similar in use and available options to the http scheme. The main difference "
"is that the communication between apt and server (or proxy) is encrypted. "
"Note that the encryption does not prevent an attacker from knowing which "
-"server (or proxy) apt is communicating with and deeper analyses can "
+"server (or proxy) apt is communicating with and deeper analysis can "
"potentially still reveal which data was downloaded. If this is a concern the "
"Tor-based schemes mentioned further below might be a suitable alternative."
msgstr ""
@@ -9262,7 +9262,7 @@ msgid ""
"http;), which, as indicated by the appended S, is wrapped in an encrypted "
"layer known as Transport Layer Security (TLS) to provide end-to-end "
"encryption. A sufficiently capable attacker can still observe the "
-"communication partners and deeper analyse of the encrypted communication "
+"communication partners and deeper analysis of the encrypted communication "
"might still reveal important details. An overview over available "
"alternative transport methods is given in &sources-list;."
msgstr ""